Things I Hearted this Week 23rd Feb 2018

February 23, 2018 | Javvad Malik
February 23, 2018 | Javvad Malik

Things I Hearted this Week 23rd Feb 2018

This week seems to have flown past very quickly. We’re almost at the end of February but the security goodness (and badness depending on which side of the fence you sit) keeps rolling in at breakneck speed.I’m actually contemplating moving somewhere warm for the rest of winter. Not that it gets unbearably cold in London,…

February 22, 2018 | Leslie Johnson

Threat Detection & Response Made Easier for Growing Financial Services Company

For a San-Francisco based financial services firm that partners with technology entrepreneurs in the US and China, maintaining a strong security posture is critical to the company’s success. The firm’s portfolio of 200 companies are security conscious and expect the firm to stay ahead of security threats. But this can be difficult, especially for a small team…

Get the latest security news in your inbox.

Subscribe via Email

February 21, 2018 | David Bisson

Crypto-Miners: What Are They and What Steps You Can Take to Protect Yourself

Bitcoin's value grew significantly in 2017. At the beginning of the year, a single Bitcoin was worth less than $1000. By year's end, its price had grown to over $13,000. That's after peaking at $19,086.84 on 19 December.Such growth didn't go unnoticed by digital attackers or by organizations looking to supplement their online advertising revenue. Both responded by deploying crypto-miners.…

February 20, 2018 | Kim Crawley

How SIEM Correlation Rules Work

SIEM is a powerful security tool when deployed properly. Network security appliances like IDS devices, IPS devices, and firewalls generate an awful lot of logs. A well-configured SIEM will alert security administrators to which events and trends they should pay attention to. Otherwise they’ll be too lost in event log noise to be able to effectively handle possible…

February 16, 2018 | Javvad Malik

Things I Hearted this Week 16th Feb 2018

Rolling in the bountyWe hear a lot about bug bounties and how some people are potentially making a lucrative living off it.HackerOne has paid out over $24m in bounties in the last five years. That’s some serious cash, considering how far that translates into local currencies. So, they asked some of their top hackers how they…

February 15, 2018 | Chris Doman

North Korean Cyber-Attacks and Collateral Damage

WannaCry was incredibly destructive. The attackers made about $150,000 - but the total damage caused by WannaCry has been estimated in the billions of dollars.There is strong evidence linking WannaCry to a group of hackers known as ‘Lazarus’, reportedly operating out of the DPRK (North Korea). Whilst WannaCry is perhaps the most famous attack by Lazarus, it isn…

February 14, 2018 | Emily Crose

Tips To Avoid LOVE-INT On Valentine’s Day

Valentine’s Day; that ever-venerated holiday celebrating human love. On a day festooned with pink hearts, mushy card exchanges, chalky candies and proclamations of undying love both for lovers and classmates alike, one thing most people try to avoid is thinking about their history of romance with people who are no longer in their life. The only…

February 12, 2018 | Devin Morrissey

Global Cybersecurity Concerns in 2018

People around the world are becoming increasingly connected with smart devices. Sending and receiving massive amounts of data back and forth, we rely on the transfer and storage of data on a daily basis. Hackers and cyber attackers know this and know how steal data for their profit. Your job as an information security specialist is to defend your company…

February 9, 2018 | Javvad Malik

Things I Hearted this Week 9th Feb 2018

Much of this week’s news cycles were dominated by Space X successfully launching the Falcon Heavy rocket into space. Putting aside concerns of the cost, the feasibility, or other criticisms, it was just nice to see something positive and optimistic grab the headlines for a change.But that doesn’t mean the intergalactic world of cyber security…

February 8, 2018 | Kanika Sharma

How Dangerous are Impersonation Attacks?

Amongst the types of cyber attacks happening, impersonation attacks are an interesting evolving category. Such attacks are generally targeted at corporate employees. The attack is executed by sending an email to the target in which the sender attempts to masquerade as a trusted source. This is done in order to gain access to target’s sensitive information, such…

February 7, 2018 | Jack Danahy

How to Handle Meltdown and Spectre: Patch, But Don’t Rush It

Welcome to 2018. If you’re still catching up, one of the first things on your radar is probably Meltdown and Spectre — two massive CPU vulnerabilities that have sent the security and broader tech world spinning.There is plenty of additional data to be found about the actual technologies involved and the likely attacks that will probably follow, but…

February 6, 2018 | TheBestVPN Team

Debunking these 3 Domain Name Registration Myths Once and For All

Let’s be honest:Domain names suck.It’s a pain to come up with possible variations. It’s time-consuming to sift through which are available (none are). And going through the process of buying an unavailable one is about as much fun as a root canal.But there’s a reason they’re such…

Watch a Demo ›